An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Dec 14, 2025 - C++
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
Inject DLLs into the explorer process using icons
Penetration testing utility and antivirus assessment tool.
Java Dynamic Reverse Engineering and Debugging Tool
EmpireCTF – write-ups, capture the flag, cybersecurity
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.
It records your screenshots and code, then lets you upload to ASHIRT
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
Windows Administrator level Implant.
Simple x86 Trampoline Hook
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.
This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode.
O UFSC OFFSEC PwnBase é uma iniciativa acadêmica do Grupo de Segurança Ofensiva (OFFSEC) da Universidade Federal de Santa Catarina (UFSC) focada no estudo, pesquisa e desenvolvimento de técnicas de segurança ofensiva e hacking ético.
🔑 WiFi captive portal that capture credentials for ESP8266. Designed for Wireless Penetration tests.
Dump a process memory and extract data based on regular expressions.
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."